2,162 research outputs found

    A Survey Study of the Current Challenges and Opportunities of Deploying the ECG Biometric Authentication Method in IoT and 5G Environments

    Get PDF
    The environment prototype of the Internet of Things (IoT) has opened the horizon for researchers to utilize such environments in deploying useful new techniques and methods in different fields and areas. The deployment process takes place when numerous IoT devices are utilized in the implementation phase for new techniques and methods. With the wide use of IoT devices in our daily lives in many fields, personal identification is becoming increasingly important for our society. This survey aims to demonstrate various aspects related to the implementation of biometric authentication in healthcare monitoring systems based on acquiring vital ECG signals via designated wearable devices that are compatible with 5G technology. The nature of ECG signals and current ongoing research related to ECG authentication are investigated in this survey along with the factors that may affect the signal acquisition process. In addition, the survey addresses the psycho-physiological factors that pose a challenge to the usage of ECG signals as a biometric trait in biometric authentication systems along with other challenges that must be addressed and resolved in any future related research.

    The use of smartphone in the 21st century

    Get PDF
    Smartphone devices are nowadays common affordable devices not only for communication purposes but also for determining the user’s position, for sending emails, managing digital agendas and to allow internet access. Starting from last decade, they become interesting instruments also for engineering and biomedical applications, thanks to their high diffusion. In 2018, 66% of individuals in 52 key countries owned a smartphone, with an increment of about 3% in only one year. This fact permitted the rapid development of apps for different goals, starting from precise positioning both in outdoor and indoor scenarios, to the 3D reconstruction of the environment using images up to driving evaluation purposes or healthcare and biomedical engineering applications. This chapter resumes the main research fields where smartphone devices are considered, providing the main references. It also introduces and briefly describes the contributions contained in this book, guiding the reader through the logical structure of the book in order to point out new possible studies and future perspectives in different reserch fields

    A Priority-based Fair Queuing (PFQ) Model for Wireless Healthcare System

    Get PDF
    Healthcare is a very active research area, primarily due to the increase in the elderly population that leads to increasing number of emergency situations that require urgent actions. In recent years some of wireless networked medical devices were equipped with different sensors to measure and report on vital signs of patient remotely. The most important sensors are Heart Beat Rate (ECG), Pressure and Glucose sensors. However, the strict requirements and real-time nature of medical applications dictate the extreme importance and need for appropriate Quality of Service (QoS), fast and accurate delivery of a patient’s measurements in reliable e-Health ecosystem. As the elderly age and older adult population is increasing (65 years and above) due to the advancement in medicine and medical care in the last two decades; high QoS and reliable e-health ecosystem has become a major challenge in Healthcare especially for patients who require continuous monitoring and attention. Nevertheless, predictions have indicated that elderly population will be approximately 2 billion in developing countries by 2050 where availability of medical staff shall be unable to cope with this growth and emergency cases that need immediate intervention. On the other side, limitations in communication networks capacity, congestions and the humongous increase of devices, applications and IOT using the available communication networks add extra layer of challenges on E-health ecosystem such as time constraints, quality of measurements and signals reaching healthcare centres. Hence this research has tackled the delay and jitter parameters in E-health M2M wireless communication and succeeded in reducing them in comparison to current available models. The novelty of this research has succeeded in developing a new Priority Queuing model ‘’Priority Based-Fair Queuing’’ (PFQ) where a new priority level and concept of ‘’Patient’s Health Record’’ (PHR) has been developed and integrated with the Priority Parameters (PP) values of each sensor to add a second level of priority. The results and data analysis performed on the PFQ model under different scenarios simulating real M2M E-health environment have revealed that the PFQ has outperformed the results obtained from simulating the widely used current models such as First in First Out (FIFO) and Weight Fair Queuing (WFQ). PFQ model has improved transmission of ECG sensor data by decreasing delay and jitter in emergency cases by 83.32% and 75.88% respectively in comparison to FIFO and 46.65% and 60.13% with respect to WFQ model. Similarly, in pressure sensor the improvements were 82.41% and 71.5% and 68.43% and 73.36% in comparison to FIFO and WFQ respectively. Data transmission were also improved in the Glucose sensor by 80.85% and 64.7% and 92.1% and 83.17% in comparison to FIFO and WFQ respectively. However, non-emergency cases data transmission using PFQ model was negatively impacted and scored higher rates than FIFO and WFQ since PFQ tends to give higher priority to emergency cases. Thus, a derivative from the PFQ model has been developed to create a new version namely “Priority Based-Fair Queuing-Tolerated Delay” (PFQ-TD) to balance the data transmission between emergency and non-emergency cases where tolerated delay in emergency cases has been considered. PFQ-TD has succeeded in balancing fairly this issue and reducing the total average delay and jitter of emergency and non-emergency cases in all sensors and keep them within the acceptable allowable standards. PFQ-TD has improved the overall average delay and jitter in emergency and non-emergency cases among all sensors by 41% and 84% respectively in comparison to PFQ model

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    Improving Energy Efficiency and Security for Pervasive Computing Systems

    Get PDF
    Pervasive computing systems are comprised of various personal mobile devices connected by the wireless networks. Pervasive computing systems have gained soaring popularity because of the rapid proliferation of the personal mobile devices. The number of personal mobile devices increased steeply over years and will surpass world population by 2016.;However, the fast development of pervasive computing systems is facing two critical issues, energy efficiency and security assurance. Power consumption of personal mobile devices keeps increasing while the battery capacity has been hardly improved over years. at the same time, a lot of private information is stored on and transmitted from personal mobile devices, which are operating in very risky environment. as such, these devices became favorite targets of malicious attacks. Without proper solutions to address these two challenging problems, concerns will keep rising and slow down the advancement of pervasive computing systems.;We select smartphones as the representative devices in our energy study because they are popular in pervasive computing systems and their energy problem concerns users the most in comparison with other devices. We start with the analysis of the power usage pattern of internal system activities, and then identify energy bugs for improving energy efficiency. We also investigate into the external communication methods employed on smartphones, such as cellular networks and wireless LANs, to reduce energy overhead on transmissions.;As to security, we focus on implantable medical devices (IMDs) that are specialized for medical purposes. Malicious attacks on IMDs may lead to serious damages both in the cyber and physical worlds. Unlike smartphones, simply borrowing existing security solutions does not work on IMDs because of their limited resources and high requirement of accessibility. Thus, we introduce an external device to serve as the security proxy for IMDs and ensure that IMDs remain accessible to save patients\u27 lives in certain emergency situations when security credentials are not available

    A Management Framework for Secure Multiparty Computation in Dynamic Environments

    Full text link
    Secure multiparty computation (SMC) is a promising technology for privacy-preserving collaborative computation. In the last years several feasibility studies have shown its practical applicability in different fields. However, it is recognized that administration and management overhead of SMC solutions are still a problem. A vital next step is the incorporation of SMC in the emerging fields of the Internet of Things and (smart) dynamic environments. In these settings, the properties of these contexts make utilization of SMC even more challenging since some of its vital premises regarding environmental stability and preliminary configuration are not initially fulfilled. We bridge this gap by providing FlexSMC, a management and orchestration framework for SMC which supports the discovery of nodes, supports a trust establishment between them and realizes robustness of SMC session by handling nodes failures and communication interruptions. The practical evaluation of FlexSMC shows that it enables the application of SMC in dynamic environments with reasonable performance penalties and computation durations allowing soft real-time and interactive use cases

    The influence of personality traits and ICT use on the boundary management of home-based teleworkers

    Get PDF
    This mixed methods study contains two studies that are linked together sequentially to explore the work/nonwork boundary management of home-based teleworkers through the overarching research question: Do personality traits and ICT use influence how teleworkers manage their work-nonwork boundary? Mobile ICT s such as smartphones are becoming increasingly more important for work and they can have a boundary blurring effect on the work-nonwork boundary as they may be used at anytime and anywhere. However, the issue of how personality traits influence ICT use and work-nonwork boundary management has been neglected, particularly in a teleworking context. As people manage their work-nonwork boundaries differently and some people work better at home than others, it is not known to what extent personality traits play a role in boundary management and ICT use. Study One explores the relationships between the big five personality traits of conscientiousness, extraversion and neuroticism, the facet level traits of dutifulness, gregariousness, and impulsiveness and work/nonwork boundary interruptions. It also explores the relationships between these traits and frequency of technology use for work purposes and the relationship of ICT s (smartphones, tablets and laptops) to work/nonwork boundary interruptions. Data was collected via an online survey, with recruitment from social media sites and Local Authorities totalling 391 usable responses. Conscientiousness was found to be negatively related to work-nonwork and nonwork-work interruptions, dutifulness negatively related to nonwork-work interruptions, neuroticism positively related to work-nonwork interruptions and impulsiveness positively related to nonwork-work interruptions. Personality traits were found to have small correlations to boundary interruptions which was a new finding, although it was expected that the correlations might have been larger than they were found to be. Extraversion was positively related to frequency of laptop use and extraversion and gregariousness were positively related to frequency of smartphone use, neuroticism was negatively related to frequency of smartphone use which were new findings in a work context. Frequency of ICT use was positively related to work-nonwork interruptions, with smartphones showing the highest correlation, followed by tablet and then laptop displaying a stepped effect. This finding of a stepped effect was new and suggests that the portability of smartphones makes them much easier to connect to work out of hours, than laptops and tablets. The second study included interviews from 20 participants who had completed the survey, four from each of five boundary management groups (Strong Segmentors, Strong Integrators, Moderate Managers, Work Boundary Protectors and Family Boundary Protectors). The groups were derived from scores from the survey data, in order to investigate in more depth, other factors that influenced boundary management interruptions that were not picked up in Study One and specifically the idiosyncrasies of ICT use between groups. The qualitative data was analysed via Template Analysis and the final themes in the template were Boundary Management, Crafting Work, Individual Differences, Telework and Interruptions. The theme of Boundary Management was dealt with in this study. Some key findings were that Study Two built upon Study One by finding that proactivity was a key theme and that this trait may be particularly active while individuals are teleworking due to the context. ICT s were used in a way that reflected the wide ranging boundary management preferences of the individuals using them
    • 

    corecore